Cybersec
Cyber attacks are an ever growing threat in today’s tech environment. Cybersec is the platform for experienced cyber security experts as well as next-gen start-ups to share knowledge with peers for jointly coping with the cybersecurity challenges. Businesses and institutions of all sectors learn how to enhance cyber resilience and protect their core.
The Spam Folder has left the Building P2 | Jill Garcia | NoSpamProxy | Cybersec Netherlands 2025
Real Cybersecurity is all about human behaviour|Arno van Hof| Junglemap| CybersecNetherlands2025
4 Lessons from Aviation to Turn Around Cybersecurity Failures |Andrew Rose| Sosafe| Cybersec NL 2025
Zero Trust - Good, But Not Good Enough? | Andy French | Object First | Cybersec Netherlands 2025
CYRA-IT: Building Cyber Resilience In Your Chain |Sanaa van de Pol| CYRA | Cybersec Netherlands 2025
Cybersecurity human behaviour-5 tips to avoid mistakes|Arno van den Hof|Junglemap|CybersecNL2025
5 Tips to Take Control of User Access Within Days| Maarten Decat| Elimity| Cybersec Netherlands 2025
Stolen Sessions-Lessons from 1year of AitM detection| Erik Remmelzwaal| NoSpamProxy|Cybersec NL 2025
Achieving Operational Resilience through DevSecOps|Gary Hallam| NoSpamProxy|CybersecNetherlands 2025
Via waarden en weerstand naar motivatie | Maarten Timmermans | NoSpamProxy|Cybersec Netherlands 2025
Stop cardfraud, bankfraud and scams customer peace of mind|Maw-Tsjong Lin|Keypasco| Cybersec NL 2025
Making IT/OT Convergence Work with IEC 62443| Davy Cavens | NoSpamProxy | Cybersec Netherlands 2025
Infostealers to NATO:Cybercriminals and Defenders Evolve P2|Harm Theunis |ESET|Cybersec NL 2025
Infostealers to NATO: Cybercriminals and Defenders Evolve |Harm Theunis|ESET|CybersecNetherlands2025
Innovaties OT security infrastructuur | Bart Hofman | TNO | Cybersec Netherlands 2025 TNO
Network Security is Dead. Now What? | M Put, Joost Hage | Watchmen | Cybersec Netherlands 2025
Navigating through an ever-evolving compliance landscape| Staphan Bos | BMGRIP | Cybersec NL 2025
Security Awareness: Secure Your Growth | Heleen van de Groep | Brooklyn Partners | Cybersec NL 2025
Managing and protecting your domain name portfolio under NIS2|Michiel Henneke|SIDN| Cybersec NL 2025
Security Awareness: Your Future CyberHeroes |I v.d Beijl&T. Murck| Northwave| Cybersec NL 2025
Til uw OT-cybersecurity naar een hoger niveau | Bert Willemsen | Axite | Cybersec Netherlands 2025
Managing & protecting your domain name portfolio |Michiel Henneke| SIDN NL|Cybersec Netherlands 2025
10 Use Cases van Geautomatiseerde Security Validatie | Nadav Elkiess | Pentera | Cybersec NL 2025
Modernizing Cyber Resiliency | Dave Stemerdink | Cohesity | Cybersec Netherlands 2025
The AI Arms Race: Good AI vs. Bad AI | Olaf Zevering | Abnormal Security | Cybersec Netherlands 2025
Machines en Cybersecurity: Hoe bereid je je voor?|Jeroen Heijkants,Sander Keim|Kader|CybersecNL 2025
Modernizing Cyber Resiliency | Dave Stemerdink | Cohesity | Cybersec Netherlands 2025
Incident Management & Response nationale en sectorale CSIRT| Patrick vd Burg | NCSC | CybersecNL2025
Bringing clarity to ISO27001 and NIS2 compliance| David Mudd | BSI Group | Cybersec Netherlands 2025
Achieving Data Sovereignty in Email & File Transfer | Rick Goud | Zivver | Cybersec Netherlands 2025